4 * This file contains the Nt* API functions of NTDLL.DLL.
5 * In the original ntdll.dll they all seem to just call int 0x2e (down to the NTOSKRNL)
7 * Copyright 1996-1998 Marcus Meissner
9 * This library is free software; you can redistribute it and/or
10 * modify it under the terms of the GNU Lesser General Public
11 * License as published by the Free Software Foundation; either
12 * version 2.1 of the License, or (at your option) any later version.
14 * This library is distributed in the hope that it will be useful,
15 * but WITHOUT ANY WARRANTY; without even the implied warranty of
16 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
17 * Lesser General Public License for more details.
19 * You should have received a copy of the GNU Lesser General Public
20 * License along with this library; if not, write to the Free Software
21 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
29 #include "wine/debug.h"
35 #include "ntdll_misc.h"
36 #include "wine/server.h"
38 WINE_DEFAULT_DEBUG_CHANNEL(ntdll
);
40 /* FIXME: fixed at 2005/2/22 */
41 static LONGLONG boottime
= (LONGLONG
)1275356510 * 100000000;
47 /******************************************************************************
48 * NtDuplicateToken [NTDLL.@]
49 * ZwDuplicateToken [NTDLL.@]
51 NTSTATUS WINAPI
NtDuplicateToken(
52 IN HANDLE ExistingToken
,
53 IN ACCESS_MASK DesiredAccess
,
54 IN POBJECT_ATTRIBUTES ObjectAttributes
,
55 IN SECURITY_IMPERSONATION_LEVEL ImpersonationLevel
,
56 IN TOKEN_TYPE TokenType
,
61 TRACE("(%p,0x%08lx,%p,0x%08x,0x%08x,%p)\n",
62 ExistingToken
, DesiredAccess
, ObjectAttributes
,
63 ImpersonationLevel
, TokenType
, NewToken
);
64 dump_ObjectAttributes(ObjectAttributes
);
66 SERVER_START_REQ( duplicate_token
)
68 req
->handle
= ExistingToken
;
69 req
->access
= DesiredAccess
;
70 req
->inherit
= ObjectAttributes
&& (ObjectAttributes
->Attributes
& OBJ_INHERIT
);
71 req
->primary
= (TokenType
== TokenPrimary
);
72 req
->impersonation_level
= ImpersonationLevel
;
73 status
= wine_server_call( req
);
74 if (!status
) *NewToken
= reply
->new_handle
;
81 /******************************************************************************
82 * NtOpenProcessToken [NTDLL.@]
83 * ZwOpenProcessToken [NTDLL.@]
85 NTSTATUS WINAPI
NtOpenProcessToken(
92 TRACE("(%p,0x%08lx,%p)\n", ProcessHandle
,DesiredAccess
, TokenHandle
);
94 SERVER_START_REQ( open_token
)
96 req
->handle
= ProcessHandle
;
98 ret
= wine_server_call( req
);
99 if (!ret
) *TokenHandle
= reply
->token
;
106 /******************************************************************************
107 * NtOpenThreadToken [NTDLL.@]
108 * ZwOpenThreadToken [NTDLL.@]
110 NTSTATUS WINAPI
NtOpenThreadToken(
118 TRACE("(%p,0x%08lx,0x%08x,%p)\n",
119 ThreadHandle
,DesiredAccess
, OpenAsSelf
, TokenHandle
);
121 SERVER_START_REQ( open_token
)
123 req
->handle
= ThreadHandle
;
124 req
->flags
= OPEN_TOKEN_THREAD
;
125 if (OpenAsSelf
) req
->flags
|= OPEN_TOKEN_AS_SELF
;
126 ret
= wine_server_call( req
);
127 if (!ret
) *TokenHandle
= reply
->token
;
134 /******************************************************************************
135 * NtAdjustPrivilegesToken [NTDLL.@]
136 * ZwAdjustPrivilegesToken [NTDLL.@]
138 * FIXME: parameters unsafe
140 NTSTATUS WINAPI
NtAdjustPrivilegesToken(
141 IN HANDLE TokenHandle
,
142 IN BOOLEAN DisableAllPrivileges
,
143 IN PTOKEN_PRIVILEGES NewState
,
144 IN DWORD BufferLength
,
145 OUT PTOKEN_PRIVILEGES PreviousState
,
146 OUT PDWORD ReturnLength
)
150 TRACE("(%p,0x%08x,%p,0x%08lx,%p,%p)\n",
151 TokenHandle
, DisableAllPrivileges
, NewState
, BufferLength
, PreviousState
, ReturnLength
);
153 SERVER_START_REQ( adjust_token_privileges
)
155 req
->handle
= TokenHandle
;
156 req
->disable_all
= DisableAllPrivileges
;
157 req
->get_modified_state
= (PreviousState
!= NULL
);
158 if (!DisableAllPrivileges
)
160 wine_server_add_data( req
, &NewState
->Privileges
,
161 NewState
->PrivilegeCount
* sizeof(NewState
->Privileges
[0]) );
163 if (PreviousState
&& BufferLength
>= FIELD_OFFSET( TOKEN_PRIVILEGES
, Privileges
))
164 wine_server_set_reply( req
, &PreviousState
->Privileges
,
165 BufferLength
- FIELD_OFFSET( TOKEN_PRIVILEGES
, Privileges
) );
166 ret
= wine_server_call( req
);
169 *ReturnLength
= reply
->len
+ FIELD_OFFSET( TOKEN_PRIVILEGES
, Privileges
);
170 PreviousState
->PrivilegeCount
= reply
->len
/ sizeof(LUID_AND_ATTRIBUTES
);
178 /******************************************************************************
179 * NtQueryInformationToken [NTDLL.@]
180 * ZwQueryInformationToken [NTDLL.@]
183 * Buffer for TokenUser:
184 * 0x00 TOKEN_USER the PSID field points to the SID
188 NTSTATUS WINAPI
NtQueryInformationToken(
190 DWORD tokeninfoclass
,
192 DWORD tokeninfolength
,
195 unsigned int len
= 0;
196 NTSTATUS status
= STATUS_SUCCESS
;
198 TRACE("(%p,%ld,%p,%ld,%p)\n",
199 token
,tokeninfoclass
,tokeninfo
,tokeninfolength
,retlen
);
201 switch (tokeninfoclass
)
204 len
= sizeof(TOKEN_USER
) + sizeof(SID
);
207 len
= sizeof(TOKEN_GROUPS
);
210 len
= sizeof(TOKEN_OWNER
) + sizeof(SID
);
212 case TokenPrimaryGroup
:
213 len
= sizeof(TOKEN_PRIMARY_GROUP
);
215 case TokenDefaultDacl
:
216 len
= sizeof(TOKEN_DEFAULT_DACL
);
219 len
= sizeof(TOKEN_SOURCE
);
222 len
= sizeof (TOKEN_TYPE
);
225 case TokenImpersonationLevel
:
226 case TokenStatistics
:
230 /* FIXME: what if retlen == NULL ? */
233 if (tokeninfolength
< len
)
234 return STATUS_BUFFER_TOO_SMALL
;
236 switch (tokeninfoclass
)
241 TOKEN_USER
* tuser
= tokeninfo
;
242 PSID sid
= (PSID
) (tuser
+ 1);
243 SID_IDENTIFIER_AUTHORITY localSidAuthority
= {SECURITY_NT_AUTHORITY
};
244 RtlInitializeSid(sid
, &localSidAuthority
, 1);
245 *(RtlSubAuthoritySid(sid
, 0)) = SECURITY_INTERACTIVE_RID
;
246 tuser
->User
.Sid
= sid
;
252 TOKEN_GROUPS
*tgroups
= tokeninfo
;
253 SID_IDENTIFIER_AUTHORITY sid
= {SECURITY_NT_AUTHORITY
};
255 /* we need to show admin privileges ! */
256 tgroups
->GroupCount
= 1;
257 tgroups
->Groups
->Attributes
= SE_GROUP_ENABLED
;
258 RtlAllocateAndInitializeSid( &sid
,
260 SECURITY_BUILTIN_DOMAIN_RID
,
261 DOMAIN_ALIAS_RID_ADMINS
,
263 &(tgroups
->Groups
->Sid
));
266 case TokenPrimaryGroup
:
269 TOKEN_PRIMARY_GROUP
*tgroup
= tokeninfo
;
270 SID_IDENTIFIER_AUTHORITY sid
= {SECURITY_NT_AUTHORITY
};
271 RtlAllocateAndInitializeSid( &sid
,
273 SECURITY_BUILTIN_DOMAIN_RID
,
274 DOMAIN_ALIAS_RID_ADMINS
,
276 &(tgroup
->PrimaryGroup
));
279 case TokenPrivileges
:
280 SERVER_START_REQ( get_token_privileges
)
282 TOKEN_PRIVILEGES
*tpriv
= tokeninfo
;
284 if (tpriv
&& tokeninfolength
> FIELD_OFFSET( TOKEN_PRIVILEGES
, Privileges
))
285 wine_server_set_reply( req
, &tpriv
->Privileges
, tokeninfolength
- FIELD_OFFSET( TOKEN_PRIVILEGES
, Privileges
) );
286 status
= wine_server_call( req
);
287 *retlen
= FIELD_OFFSET( TOKEN_PRIVILEGES
, Privileges
) + reply
->len
;
288 if (tpriv
) tpriv
->PrivilegeCount
= reply
->len
/ sizeof(LUID_AND_ATTRIBUTES
);
295 TOKEN_OWNER
*owner
= tokeninfo
;
296 PSID sid
= (PSID
) (owner
+ 1);
297 SID_IDENTIFIER_AUTHORITY localSidAuthority
= {SECURITY_NT_AUTHORITY
};
298 RtlInitializeSid(sid
, &localSidAuthority
, 1);
299 *(RtlSubAuthoritySid(sid
, 0)) = SECURITY_INTERACTIVE_RID
;
305 ERR("Unhandled Token Information class %ld!\n", tokeninfoclass
);
306 return STATUS_NOT_IMPLEMENTED
;
312 /******************************************************************************
313 * NtSetInformationToken [NTDLL.@]
314 * ZwSetInformationToken [NTDLL.@]
316 NTSTATUS WINAPI
NtSetInformationToken(
318 TOKEN_INFORMATION_CLASS TokenInformationClass
,
319 PVOID TokenInformation
,
320 ULONG TokenInformationLength
)
322 FIXME("%p %d %p %lu\n", TokenHandle
, TokenInformationClass
,
323 TokenInformation
, TokenInformationLength
);
324 return STATUS_NOT_IMPLEMENTED
;
327 /******************************************************************************
328 * NtAdjustGroupsToken [NTDLL.@]
329 * ZwAdjustGroupsToken [NTDLL.@]
331 NTSTATUS WINAPI
NtAdjustGroupsToken(
333 BOOLEAN ResetToDefault
,
334 PTOKEN_GROUPS NewState
,
336 PTOKEN_GROUPS PreviousState
,
339 FIXME("%p %d %p %lu %p %p\n", TokenHandle
, ResetToDefault
,
340 NewState
, BufferLength
, PreviousState
, ReturnLength
);
341 return STATUS_NOT_IMPLEMENTED
;
344 /******************************************************************************
345 * NtPrivilegeCheck [NTDLL.@]
346 * ZwPrivilegeCheck [NTDLL.@]
348 NTSTATUS WINAPI
NtPrivilegeCheck(
350 PPRIVILEGE_SET RequiredPrivileges
,
354 SERVER_START_REQ( check_token_privileges
)
356 req
->handle
= ClientToken
;
357 req
->all_required
= ((RequiredPrivileges
->Control
& PRIVILEGE_SET_ALL_NECESSARY
) ? TRUE
: FALSE
);
358 wine_server_add_data( req
, &RequiredPrivileges
->Privilege
,
359 RequiredPrivileges
->PrivilegeCount
* sizeof(RequiredPrivileges
->Privilege
[0]) );
360 wine_server_set_reply( req
, &RequiredPrivileges
->Privilege
,
361 RequiredPrivileges
->PrivilegeCount
* sizeof(RequiredPrivileges
->Privilege
[0]) );
363 status
= wine_server_call( req
);
365 if (status
== STATUS_SUCCESS
)
366 *Result
= (reply
->has_privileges
? TRUE
: FALSE
);
376 /******************************************************************************
377 * NtQuerySection [NTDLL.@]
379 NTSTATUS WINAPI
NtQuerySection(
380 IN HANDLE SectionHandle
,
381 IN SECTION_INFORMATION_CLASS SectionInformationClass
,
382 OUT PVOID SectionInformation
,
384 OUT PULONG ResultLength
)
386 FIXME("(%p,%d,%p,0x%08lx,%p) stub!\n",
387 SectionHandle
,SectionInformationClass
,SectionInformation
,Length
,ResultLength
);
395 /******************************************************************************
396 * NtCreatePort [NTDLL.@]
397 * ZwCreatePort [NTDLL.@]
399 NTSTATUS WINAPI
NtCreatePort(PHANDLE PortHandle
,POBJECT_ATTRIBUTES ObjectAttributes
,
400 ULONG MaxConnectInfoLength
,ULONG MaxDataLength
,PULONG reserved
)
402 FIXME("(%p,%p,%lu,%lu,%p),stub!\n",PortHandle
,ObjectAttributes
,
403 MaxConnectInfoLength
,MaxDataLength
,reserved
);
407 /******************************************************************************
408 * NtConnectPort [NTDLL.@]
409 * ZwConnectPort [NTDLL.@]
411 NTSTATUS WINAPI
NtConnectPort(
413 PUNICODE_STRING PortName
,
414 PSECURITY_QUALITY_OF_SERVICE SecurityQos
,
415 PLPC_SECTION_WRITE WriteSection
,
416 PLPC_SECTION_READ ReadSection
,
417 PULONG MaximumMessageLength
,
419 PULONG pConnectInfoLength
)
421 FIXME("(%p,%s,%p,%p,%p,%p,%p,%p),stub!\n",
422 PortHandle
,debugstr_w(PortName
->Buffer
),SecurityQos
,
423 WriteSection
,ReadSection
,MaximumMessageLength
,ConnectInfo
,
425 if (ConnectInfo
&& pConnectInfoLength
)
426 TRACE("\tMessage = %s\n",debugstr_an(ConnectInfo
,*pConnectInfoLength
));
430 /******************************************************************************
431 * NtListenPort [NTDLL.@]
432 * ZwListenPort [NTDLL.@]
434 NTSTATUS WINAPI
NtListenPort(HANDLE PortHandle
,PLPC_MESSAGE pLpcMessage
)
436 FIXME("(%p,%p),stub!\n",PortHandle
,pLpcMessage
);
440 /******************************************************************************
441 * NtAcceptConnectPort [NTDLL.@]
442 * ZwAcceptConnectPort [NTDLL.@]
444 NTSTATUS WINAPI
NtAcceptConnectPort(
446 ULONG PortIdentifier
,
447 PLPC_MESSAGE pLpcMessage
,
449 PLPC_SECTION_WRITE WriteSection
,
450 PLPC_SECTION_READ ReadSection
)
452 FIXME("(%p,%lu,%p,%d,%p,%p),stub!\n",
453 PortHandle
,PortIdentifier
,pLpcMessage
,Accept
,WriteSection
,ReadSection
);
457 /******************************************************************************
458 * NtCompleteConnectPort [NTDLL.@]
459 * ZwCompleteConnectPort [NTDLL.@]
461 NTSTATUS WINAPI
NtCompleteConnectPort(HANDLE PortHandle
)
463 FIXME("(%p),stub!\n",PortHandle
);
467 /******************************************************************************
468 * NtRegisterThreadTerminatePort [NTDLL.@]
469 * ZwRegisterThreadTerminatePort [NTDLL.@]
471 NTSTATUS WINAPI
NtRegisterThreadTerminatePort(HANDLE PortHandle
)
473 FIXME("(%p),stub!\n",PortHandle
);
477 /******************************************************************************
478 * NtRequestWaitReplyPort [NTDLL.@]
479 * ZwRequestWaitReplyPort [NTDLL.@]
481 NTSTATUS WINAPI
NtRequestWaitReplyPort(
483 PLPC_MESSAGE pLpcMessageIn
,
484 PLPC_MESSAGE pLpcMessageOut
)
486 FIXME("(%p,%p,%p),stub!\n",PortHandle
,pLpcMessageIn
,pLpcMessageOut
);
489 TRACE("Message to send:\n");
490 TRACE("\tDataSize = %u\n",pLpcMessageIn
->DataSize
);
491 TRACE("\tMessageSize = %u\n",pLpcMessageIn
->MessageSize
);
492 TRACE("\tMessageType = %u\n",pLpcMessageIn
->MessageType
);
493 TRACE("\tVirtualRangesOffset = %u\n",pLpcMessageIn
->VirtualRangesOffset
);
494 TRACE("\tClientId.UniqueProcess = %p\n",pLpcMessageIn
->ClientId
.UniqueProcess
);
495 TRACE("\tClientId.UniqueThread = %p\n",pLpcMessageIn
->ClientId
.UniqueThread
);
496 TRACE("\tMessageId = %lu\n",pLpcMessageIn
->MessageId
);
497 TRACE("\tSectionSize = %lu\n",pLpcMessageIn
->SectionSize
);
498 TRACE("\tData = %s\n",
499 debugstr_an(pLpcMessageIn
->Data
,pLpcMessageIn
->DataSize
));
504 /******************************************************************************
505 * NtReplyWaitReceivePort [NTDLL.@]
506 * ZwReplyWaitReceivePort [NTDLL.@]
508 NTSTATUS WINAPI
NtReplyWaitReceivePort(
510 PULONG PortIdentifier
,
511 PLPC_MESSAGE ReplyMessage
,
512 PLPC_MESSAGE Message
)
514 FIXME("(%p,%p,%p,%p),stub!\n",PortHandle
,PortIdentifier
,ReplyMessage
,Message
);
522 /******************************************************************************
523 * NtSetIntervalProfile [NTDLL.@]
524 * ZwSetIntervalProfile [NTDLL.@]
526 NTSTATUS WINAPI
NtSetIntervalProfile(DWORD x1
,DWORD x2
) {
527 FIXME("(0x%08lx,0x%08lx),stub!\n",x1
,x2
);
531 /******************************************************************************
532 * NtQueryPerformanceCounter [NTDLL.@]
534 * Note: Windows uses a timer clocked at a multiple of 1193182 Hz. There is a
535 * good number of applications that crash when the returned frequency is either
536 * lower or higher then what Windows gives. Also too high counter values are
537 * reported to give problems.
539 NTSTATUS WINAPI
NtQueryPerformanceCounter(
540 OUT PLARGE_INTEGER Counter
,
541 OUT PLARGE_INTEGER Frequency
)
545 if (!Counter
) return STATUS_ACCESS_VIOLATION
;
546 NtQuerySystemTime( &time
);
547 time
.QuadPart
-= boottime
;
548 /* convert a counter that increments at a rate of 10 MHz
549 * to one of 1193182 Hz, with some care for arithmetic
550 * overflow ( will not overflow until 3396 or so ) and
551 * good accuracy ( 21/176 = 0.119318182) */
552 Counter
->QuadPart
= (time
.QuadPart
* 21) / 176;
554 Frequency
->QuadPart
= 1193182;
558 /******************************************************************************
559 * NtQuerySystemInformation [NTDLL.@]
560 * ZwQuerySystemInformation [NTDLL.@]
563 * SystemInformationClass Index to a certain information structure
564 * SystemTimeAdjustmentInformation SYSTEM_TIME_ADJUSTMENT
565 * SystemCacheInformation SYSTEM_CACHE_INFORMATION
566 * SystemConfigurationInformation CONFIGURATION_INFORMATION
567 * observed (class/len):
573 * SystemInformation caller supplies storage for the information structure
574 * Length size of the structure
575 * ResultLength Data written
577 NTSTATUS WINAPI
NtQuerySystemInformation(
578 IN SYSTEM_INFORMATION_CLASS SystemInformationClass
,
579 OUT PVOID SystemInformation
,
581 OUT PULONG ResultLength
)
583 NTSTATUS ret
= STATUS_SUCCESS
;
586 TRACE("(0x%08x,%p,0x%08lx,%p)\n",
587 SystemInformationClass
,SystemInformation
,Length
,ResultLength
);
589 switch (SystemInformationClass
)
591 case SystemBasicInformation
:
593 SYSTEM_BASIC_INFORMATION sbi
;
596 sbi
.uKeMaximumIncrement
= 0;
597 sbi
.uPageSize
= 1024; /* FIXME */
598 sbi
.uMmNumberOfPhysicalPages
= 12345; /* FIXME */
599 sbi
.uMmLowestPhysicalPage
= 0; /* FIXME */
600 sbi
.uMmHighestPhysicalPage
= 12345; /* FIXME */
601 sbi
.uAllocationGranularity
= 65536; /* FIXME */
602 sbi
.pLowestUserAddress
= 0; /* FIXME */
603 sbi
.pMmHighestUserAddress
= (void*)~0; /* FIXME */
604 sbi
.uKeActiveProcessors
= 1; /* FIXME */
605 sbi
.bKeNumberProcessors
= 1; /* FIXME */
610 if (!SystemInformation
) ret
= STATUS_ACCESS_VIOLATION
;
611 else memcpy( SystemInformation
, &sbi
, len
);
613 else ret
= STATUS_INFO_LENGTH_MISMATCH
;
616 case SystemCpuInformation
:
618 SYSTEM_CPU_INFORMATION sci
;
620 /* FIXME: move some code from kernel/cpu.c to process this */
621 sci
.Architecture
= PROCESSOR_ARCHITECTURE_INTEL
;
622 sci
.Level
= 6; /* 686, aka Pentium II+ */
625 sci
.FeatureSet
= 0x1fff;
630 if (!SystemInformation
) ret
= STATUS_ACCESS_VIOLATION
;
631 else memcpy( SystemInformation
, &sci
, len
);
633 else ret
= STATUS_INFO_LENGTH_MISMATCH
;
636 case SystemPerformanceInformation
:
638 SYSTEM_PERFORMANCE_INFORMATION
* spi
= (SYSTEM_PERFORMANCE_INFORMATION
*)SystemInformation
;
639 if (Length
>= sizeof(*spi
))
641 memset(spi
, 0, sizeof(*spi
)); /* FIXME */
644 else ret
= STATUS_INFO_LENGTH_MISMATCH
;
647 case SystemTimeOfDayInformation
:
649 SYSTEM_TIMEOFDAY_INFORMATION sti
;
651 memset(&sti
, 0 , sizeof(sti
));
653 /* liKeSystemTime, liExpTimeZoneBias, uCurrentTimeZoneId */
654 sti
.liKeBootTime
.QuadPart
= boottime
;
656 if (Length
<= sizeof(sti
))
659 if (!SystemInformation
) ret
= STATUS_ACCESS_VIOLATION
;
660 else memcpy( SystemInformation
, &sti
, Length
);
662 else ret
= STATUS_INFO_LENGTH_MISMATCH
;
665 case SystemProcessInformation
:
667 SYSTEM_PROCESS_INFORMATION
* spi
= (SYSTEM_PROCESS_INFORMATION
*)SystemInformation
;
668 SYSTEM_PROCESS_INFORMATION
* last
= NULL
;
670 WCHAR procname
[1024];
672 DWORD procstructlen
= 0;
674 SERVER_START_REQ( create_snapshot
)
676 req
->flags
= SNAP_PROCESS
| SNAP_THREAD
;
677 req
->inherit
= FALSE
;
679 if (!(ret
= wine_server_call( req
))) hSnap
= reply
->handle
;
683 while (ret
== STATUS_SUCCESS
)
685 SERVER_START_REQ( next_process
)
688 req
->reset
= (len
== 0);
689 wine_server_set_reply( req
, procname
, sizeof(procname
) );
690 if (!(ret
= wine_server_call( req
)))
692 wlen
= wine_server_reply_size(reply
) + sizeof(WCHAR
);
693 procstructlen
= sizeof(*spi
) + wlen
+ ((reply
->threads
- 1) * sizeof(SYSTEM_THREAD_INFORMATION
));
694 if (Length
>= len
+ procstructlen
)
696 /* ftCreationTime, ftUserTime, ftKernelTime;
697 * vmCounters, ioCounters
700 memset(spi
, 0, sizeof(*spi
));
702 spi
->dwOffset
= procstructlen
- wlen
;
703 spi
->dwThreadCount
= reply
->threads
;
705 /* spi->pszProcessName will be set later on */
707 spi
->dwBasePriority
= reply
->priority
;
708 spi
->dwProcessID
= (DWORD
)reply
->pid
;
709 spi
->dwParentProcessID
= (DWORD
)reply
->ppid
;
710 spi
->dwHandleCount
= reply
->handles
;
712 /* spi->ti will be set later on */
714 len
+= procstructlen
;
716 else ret
= STATUS_INFO_LENGTH_MISMATCH
;
721 if (ret
!= STATUS_SUCCESS
)
723 if (ret
== STATUS_NO_MORE_FILES
) ret
= STATUS_SUCCESS
;
726 else /* Length is already checked for */
730 /* set thread info */
732 while (ret
== STATUS_SUCCESS
)
734 SERVER_START_REQ( next_thread
)
737 req
->reset
= (j
== 0);
738 if (!(ret
= wine_server_call( req
)))
741 if (reply
->pid
== spi
->dwProcessID
)
743 /* ftKernelTime, ftUserTime, ftCreateTime;
744 * dwTickCount, dwStartAddress
747 memset(&spi
->ti
[i
], 0, sizeof(spi
->ti
));
749 spi
->ti
[i
].dwOwningPID
= reply
->pid
;
750 spi
->ti
[i
].dwThreadID
= reply
->tid
;
751 spi
->ti
[i
].dwCurrentPriority
= reply
->base_pri
+ reply
->delta_pri
;
752 spi
->ti
[i
].dwBasePriority
= reply
->base_pri
;
759 if (ret
== STATUS_NO_MORE_FILES
) ret
= STATUS_SUCCESS
;
761 /* now append process name */
762 spi
->ProcessName
.Buffer
= (WCHAR
*)((char*)spi
+ spi
->dwOffset
);
763 spi
->ProcessName
.Length
= wlen
- sizeof(WCHAR
);
764 spi
->ProcessName
.MaximumLength
= wlen
;
765 memcpy( spi
->ProcessName
.Buffer
, procname
, spi
->ProcessName
.Length
);
766 spi
->ProcessName
.Buffer
[spi
->ProcessName
.Length
/ sizeof(WCHAR
)] = 0;
767 spi
->dwOffset
+= wlen
;
770 spi
= (SYSTEM_PROCESS_INFORMATION
*)((char*)spi
+ spi
->dwOffset
);
773 if (ret
== STATUS_SUCCESS
&& last
) last
->dwOffset
= 0;
774 if (hSnap
) NtClose(hSnap
);
777 case SystemProcessorPerformanceInformation
:
779 SYSTEM_PROCESSOR_PERFORMANCE_INFORMATION
* sppi
= (SYSTEM_PROCESSOR_PERFORMANCE_INFORMATION
*)SystemInformation
;
780 if (Length
>= sizeof(*sppi
))
782 memset(sppi
, 0, sizeof(*sppi
)); /* FIXME */
785 else ret
= STATUS_INFO_LENGTH_MISMATCH
;
788 case SystemModuleInformation
:
790 SYSTEM_DRIVER_INFORMATION sdi
;
792 memset(&sdi
, 0, sizeof(sdi
));
797 if (!SystemInformation
) ret
= STATUS_ACCESS_VIOLATION
;
798 else memcpy( SystemInformation
, &sdi
, len
);
800 else ret
= STATUS_INFO_LENGTH_MISMATCH
;
803 case SystemHandleInformation
:
805 SYSTEM_HANDLE_INFORMATION shi
;
807 memset(&shi
, 0, sizeof(shi
));
812 if (!SystemInformation
) ret
= STATUS_ACCESS_VIOLATION
;
813 else memcpy( SystemInformation
, &shi
, len
);
815 else ret
= STATUS_INFO_LENGTH_MISMATCH
;
818 case SystemCacheInformation
:
820 SYSTEM_CACHE_INFORMATION
* sci
= (SYSTEM_CACHE_INFORMATION
*)SystemInformation
;
821 if (Length
>= sizeof(*sci
))
823 memset(sci
, 0, sizeof(*sci
)); /* FIXME */
826 else ret
= STATUS_INFO_LENGTH_MISMATCH
;
829 case SystemInterruptInformation
:
831 SYSTEM_INTERRUPT_INFORMATION sii
;
833 memset(&sii
, 0, sizeof(sii
));
838 if (!SystemInformation
) ret
= STATUS_ACCESS_VIOLATION
;
839 else memcpy( SystemInformation
, &sii
, len
);
841 else ret
= STATUS_INFO_LENGTH_MISMATCH
;
844 case SystemKernelDebuggerInformation
:
846 PSYSTEM_KERNEL_DEBUGGER_INFORMATION pkdi
;
847 if( Length
>= sizeof(*pkdi
))
849 pkdi
= SystemInformation
;
850 pkdi
->DebuggerEnabled
= FALSE
;
851 pkdi
->DebuggerNotPresent
= TRUE
;
854 else ret
= STATUS_INFO_LENGTH_MISMATCH
;
857 case SystemRegistryQuotaInformation
:
858 /* Something to do with the size of the registry *
859 * Since we don't have a size limitation, fake it *
860 * This is almost certainly wrong. *
861 * This sets each of the three words in the struct to 32 MB, *
862 * which is enough to make the IE 5 installer happy. */
864 SYSTEM_REGISTRY_QUOTA_INFORMATION
* srqi
= (SYSTEM_REGISTRY_QUOTA_INFORMATION
*)SystemInformation
;
865 if (Length
>= sizeof(*srqi
))
867 FIXME("(0x%08x,%p,0x%08lx,%p) faking max registry size of 32 MB\n",
868 SystemInformationClass
,SystemInformation
,Length
,ResultLength
);
869 srqi
->RegistryQuotaAllowed
= 0x2000000;
870 srqi
->RegistryQuotaUsed
= 0x200000;
871 srqi
->Reserved1
= (void*)0x200000;
874 else ret
= STATUS_INFO_LENGTH_MISMATCH
;
878 FIXME("(0x%08x,%p,0x%08lx,%p) stub\n",
879 SystemInformationClass
,SystemInformation
,Length
,ResultLength
);
881 /* Several Information Classes are not implemented on Windows and return 2 different values
882 * STATUS_NOT_IMPLEMENTED or STATUS_INVALID_INFO_CLASS
883 * in 95% of the cases it's STATUS_INVALID_INFO_CLASS, so use this as the default
885 ret
= STATUS_INVALID_INFO_CLASS
;
888 if (ResultLength
) *ResultLength
= len
;
894 /******************************************************************************
895 * NtCreatePagingFile [NTDLL.@]
896 * ZwCreatePagingFile [NTDLL.@]
898 NTSTATUS WINAPI
NtCreatePagingFile(
899 IN PUNICODE_STRING PageFileName
,
902 OUT PULONG ActualSize
)
904 FIXME("(%p(%s),0x%08lx,0x%08lx,%p),stub!\n",
905 PageFileName
->Buffer
, debugstr_w(PageFileName
->Buffer
),MiniumSize
,MaxiumSize
,ActualSize
);
909 /******************************************************************************
910 * NtDisplayString [NTDLL.@]
912 * writes a string to the nt-textmode screen eg. during startup
914 NTSTATUS WINAPI
NtDisplayString ( PUNICODE_STRING string
)
919 if (!(ret
= RtlUnicodeStringToAnsiString( &stringA
, string
, TRUE
)))
921 MESSAGE( "%.*s", stringA
.Length
, stringA
.Buffer
);
922 RtlFreeAnsiString( &stringA
);
927 /******************************************************************************
928 * NtInitiatePowerAction [NTDLL.@]
931 NTSTATUS WINAPI
NtInitiatePowerAction(
932 IN POWER_ACTION SystemAction
,
933 IN SYSTEM_POWER_STATE MinSystemState
,
935 IN BOOLEAN Asynchronous
)
937 FIXME("(%d,%d,0x%08lx,%d),stub\n",
938 SystemAction
,MinSystemState
,Flags
,Asynchronous
);
939 return STATUS_NOT_IMPLEMENTED
;
943 /******************************************************************************
944 * NtPowerInformation [NTDLL.@]
947 NTSTATUS WINAPI
NtPowerInformation(
948 IN POWER_INFORMATION_LEVEL InformationLevel
,
949 IN PVOID lpInputBuffer
,
950 IN ULONG nInputBufferSize
,
951 IN PVOID lpOutputBuffer
,
952 IN ULONG nOutputBufferSize
)
954 TRACE("(%d,%p,%ld,%p,%ld)\n",
955 InformationLevel
,lpInputBuffer
,nInputBufferSize
,lpOutputBuffer
,nOutputBufferSize
);
956 switch(InformationLevel
) {
957 case SystemPowerCapabilities
: {
958 PSYSTEM_POWER_CAPABILITIES PowerCaps
= (PSYSTEM_POWER_CAPABILITIES
)lpOutputBuffer
;
959 FIXME("semi-stub: SystemPowerCapabilities\n");
960 if (nOutputBufferSize
< sizeof(SYSTEM_POWER_CAPABILITIES
))
961 return STATUS_BUFFER_TOO_SMALL
;
962 /* FIXME: These values are based off a native XP desktop, should probably use APM/ACPI to get the 'real' values */
963 PowerCaps
->PowerButtonPresent
= TRUE
;
964 PowerCaps
->SleepButtonPresent
= FALSE
;
965 PowerCaps
->LidPresent
= FALSE
;
966 PowerCaps
->SystemS1
= TRUE
;
967 PowerCaps
->SystemS2
= FALSE
;
968 PowerCaps
->SystemS3
= FALSE
;
969 PowerCaps
->SystemS4
= TRUE
;
970 PowerCaps
->SystemS5
= TRUE
;
971 PowerCaps
->HiberFilePresent
= TRUE
;
972 PowerCaps
->FullWake
= TRUE
;
973 PowerCaps
->VideoDimPresent
= FALSE
;
974 PowerCaps
->ApmPresent
= FALSE
;
975 PowerCaps
->UpsPresent
= FALSE
;
976 PowerCaps
->ThermalControl
= FALSE
;
977 PowerCaps
->ProcessorThrottle
= FALSE
;
978 PowerCaps
->ProcessorMinThrottle
= 100;
979 PowerCaps
->ProcessorMaxThrottle
= 100;
980 PowerCaps
->DiskSpinDown
= TRUE
;
981 PowerCaps
->SystemBatteriesPresent
= FALSE
;
982 PowerCaps
->BatteriesAreShortTerm
= FALSE
;
983 PowerCaps
->BatteryScale
[0].Granularity
= 0;
984 PowerCaps
->BatteryScale
[0].Capacity
= 0;
985 PowerCaps
->BatteryScale
[1].Granularity
= 0;
986 PowerCaps
->BatteryScale
[1].Capacity
= 0;
987 PowerCaps
->BatteryScale
[2].Granularity
= 0;
988 PowerCaps
->BatteryScale
[2].Capacity
= 0;
989 PowerCaps
->AcOnLineWake
= PowerSystemUnspecified
;
990 PowerCaps
->SoftLidWake
= PowerSystemUnspecified
;
991 PowerCaps
->RtcWake
= PowerSystemSleeping1
;
992 PowerCaps
->MinDeviceWakeState
= PowerSystemUnspecified
;
993 PowerCaps
->DefaultLowLatencyWake
= PowerSystemUnspecified
;
994 return STATUS_SUCCESS
;
997 FIXME("Unimplemented NtPowerInformation action: %d\n", InformationLevel
);
998 return STATUS_NOT_IMPLEMENTED
;
1002 /******************************************************************************
1003 * NtShutdownSystem [NTDLL.@]
1006 NTSTATUS WINAPI
NtShutdownSystem(DWORD x1
)
1008 FIXME("(0x%08lx),stub\n",x1
);
1012 /******************************************************************************
1013 * NtAllocateLocallyUniqueId (NTDLL.@)
1015 * FIXME: the server should do that
1017 NTSTATUS WINAPI
NtAllocateLocallyUniqueId(PLUID Luid
)
1019 static LUID luid
= { SE_MAX_WELL_KNOWN_PRIVILEGE
, 0 };
1021 FIXME("%p\n", Luid
);
1024 return STATUS_ACCESS_VIOLATION
;
1027 if (luid
.LowPart
==0)
1029 Luid
->HighPart
= luid
.HighPart
;
1030 Luid
->LowPart
= luid
.LowPart
;
1032 return STATUS_SUCCESS
;
1035 /******************************************************************************
1036 * VerSetConditionMask (NTDLL.@)
1038 ULONGLONG WINAPI
VerSetConditionMask( ULONGLONG dwlConditionMask
, DWORD dwTypeBitMask
,
1039 BYTE dwConditionMask
)
1041 if(dwTypeBitMask
== 0)
1042 return dwlConditionMask
;
1043 dwConditionMask
&= 0x07;
1044 if(dwConditionMask
== 0)
1045 return dwlConditionMask
;
1047 if(dwTypeBitMask
& VER_PRODUCT_TYPE
)
1048 dwlConditionMask
|= dwConditionMask
<< 7*3;
1049 else if (dwTypeBitMask
& VER_SUITENAME
)
1050 dwlConditionMask
|= dwConditionMask
<< 6*3;
1051 else if (dwTypeBitMask
& VER_SERVICEPACKMAJOR
)
1052 dwlConditionMask
|= dwConditionMask
<< 5*3;
1053 else if (dwTypeBitMask
& VER_SERVICEPACKMINOR
)
1054 dwlConditionMask
|= dwConditionMask
<< 4*3;
1055 else if (dwTypeBitMask
& VER_PLATFORMID
)
1056 dwlConditionMask
|= dwConditionMask
<< 3*3;
1057 else if (dwTypeBitMask
& VER_BUILDNUMBER
)
1058 dwlConditionMask
|= dwConditionMask
<< 2*3;
1059 else if (dwTypeBitMask
& VER_MAJORVERSION
)
1060 dwlConditionMask
|= dwConditionMask
<< 1*3;
1061 else if (dwTypeBitMask
& VER_MINORVERSION
)
1062 dwlConditionMask
|= dwConditionMask
<< 0*3;
1063 return dwlConditionMask
;
1066 /******************************************************************************
1067 * NtAlertThread (NTDLL.@)
1069 NTSTATUS WINAPI
NtAlertThread(HANDLE ThreadHandle
)
1071 FIXME("%p\n", ThreadHandle
);
1072 return STATUS_NOT_IMPLEMENTED
;